Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 02:36

General

  • Target

    http://coopertbrance.com

Score
5/10

Malware Config

Signatures

  • Detected potential entity reuse from brand whatsapp.
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 37 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" http://coopertbrance.com
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2684
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3660
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2684 CREDAT:17414 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:3672
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
    1⤵
      PID:4764

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      Filesize

      471B

      MD5

      003a496cfd41526dddbe8b00273a047f

      SHA1

      f59d563a2a66fe14a3f7787a00e96359aedb5ab8

      SHA256

      c7a19cd00fd53275f30a71c8f5d87161e5caff68207f4069079ea1448a9ebf41

      SHA512

      e4601d093066d6b28e0d99057218f7fb2501fcf24d59b46e0b7babcd24408f4cf0739873b5e74580d6b7a49df6af5ddcc241875ab4633a872a2262b7e7e0b191

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
      Filesize

      404B

      MD5

      c0fce0216dbbc26377305299fc28d167

      SHA1

      66f0d300a6ebefd3be44bbf0aaab485ca85f688a

      SHA256

      426588b3560b79a18059eedfd0c6422accbaa06e954ac1f5f014e5bba0ab5e4b

      SHA512

      5536becc2a18074d22a9aa9627bf9c128a6849b2e4ca73be924f7405e96212ad5aac33b316f34093a2d80877c8fc630fec0fb5af5ef0c7d7117221b641df6deb

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2klo80q\imagestore.dat
      Filesize

      7KB

      MD5

      8b9c3217be4451e37a2439a63de1b060

      SHA1

      3dd0618240047dbd13607b2a0d08303d89337777

      SHA256

      c9e827823f9b9c9da9fe563beebfe05ed3d2421fc1ebd2548b8fc68b184704b8

      SHA512

      ff0fcf35a27b4edf37553354ef277c9cce88bdd54850162b56426d6a3b9fcc2007767d69c39fc5c2c0c16a7cdef62ec791da8852aea2b34ac8eafa5faed61639

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\2klo80q\imagestore.dat
      Filesize

      8KB

      MD5

      dda45d939e48105a83973c1b8a022c7e

      SHA1

      0bc1fe2fdcc3930ba6638f52835598630f0fb36d

      SHA256

      13e7f31bb56afdb291c0e33ed67a2aa5ed33124e61d744bb37d33c7345d7bd2c

      SHA512

      bc6e601b8cafea5b082f2b2b79e76c0cbaafc40d9002cfa61ff40a85a2da28cc37699bdd30c90044471224d0c8d4bdece1773073c8c1ba85f524f772a981e940